WANs must be publicly-owned, but LANs can be owned by either public or private entities

Correct

Incorrect

Question 19 of 36

19. Question

19. Which three network tools provide the minimum required security protection for home users? (Choose three.)

antivirus software

antispyware software

an intrusion prevention system

powerline networking

a firewall

access control lists

Correct

Incorrect

Question 20 of 36

20. Question

20. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

intranet

wired LAN

wireless LAN

extranet

wireless WAN

Correct

Incorrect

Question 21 of 36

21. Question

21. Which expression accurately defines the term congestion?

a method of limiting the impact of a hardware or software failure on the network

a set of techniques to manage the utilization of network resources

a state where the demand on the network resources exceeds the available capacity

a measure of the data carrying capacity of the network

Correct

Incorrect

Question 22 of 36

22. Question

22. What two criteria are used to help select a network medium from various network media? (Choose two.)

the types of data that need to be prioritized

the cost of the end devices utilized in the network

the number of intermediary devices installed in the network

the environment where the selected medium is to be installed

the distance the selected medium can successfully carry a signal

Correct

Incorrect

Question 23 of 36

23. Question

23. Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

optimization

congestion

convergence

synchronization

Correct

Incorrect

Question 24 of 36

24. Question

24. A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)

better security

easy to create

better device performance when acting as both client and server

lacks centralized administration

less cost to implement

scalable

Correct

Incorrect

Question 25 of 36

25. Question

25. Which two statements describe intermediary devices? (Choose two.)

Intermediary devices generate data content.

Intermediary devices alter data content.

Intermediary devices direct the path of the data.

Intermediary devices connect individual hosts to the network.

Intermediary devices initiate the encapsulation process.

Correct

Incorrect

Question 26 of 36

26. Question

What are two functions of end devices on a network? (Choose two.)

They originate the data that flows through the network.

They direct data over alternate paths in the event of link failures.

They filter the flow of data to enhance security.

They are the interface between humans and the communication network.

They provide the channel over which the network message travels.

Correct

Incorrect

Question 27 of 36

27. Question

27. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

an intranet

the Internet

an extranet

a local area network

Correct

Incorrect

Question 28 of 36

28. Question

28. Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)

cellular

DSL

satellite

cable

dial-up telephone

Correct

Incorrect

Question 29 of 36

29. Question

29. What type of network traffic requires QoS?

email

on-line purchasing

video conferencing

wiki

Correct

Incorrect

Question 30 of 36

30. Question

30. Which expression accurately defines the term bandwidth?

a method of limiting the impact of a hardware or software failure on the network

a measure of the data carrying capacity of the media

a state where the demand on the network resources exceeds the available capacity

a set of techniques to manage the utilization of network resources

Correct

Incorrect

Question 31 of 36

31. Question

31. A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

data integrity

data quality

data confidentiality

data redundancy

Correct

Incorrect

Question 32 of 36

32. Question

32. Which statement describes the use of powerline networking technology?

New “smart” electrical cabling is used to extend an existing home LAN.

A home LAN is installed without the use of physical cabling.

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

Wireless access points use powerline adapters to distribute data through the home LAN.

Correct

Incorrect

Question 33 of 36

33. Question

33. What security violation would cause the most amount of damage to the life of a home user?

denial of service to your email server

replication of worms and viruses in your computer

capturing of personal data that leads to identity theft

spyware that leads to spam emails

Correct

Incorrect

Question 34 of 36

34. Question

34. A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

implementing a firewall

installing a wireless network

installing antivirus software

implementing an intrusion detection system

adding a dedicated intrusion prevention device

Correct

Incorrect

Question 35 of 36

35. Question

35. Fill in the blank

A (converged) network is capable of delivering voice, video, text, and graphics over the same communication channels.

Correct

Incorrect

Question 36 of 36

36. Question

36. Fill in the blank.

The acronym (byod, BYOD) refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.